首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   127篇
  免费   5篇
电工技术   1篇
化学工业   24篇
金属工艺   5篇
机械仪表   4篇
建筑科学   1篇
矿业工程   4篇
能源动力   4篇
轻工业   18篇
石油天然气   1篇
无线电   12篇
一般工业技术   28篇
冶金工业   17篇
原子能技术   1篇
自动化技术   12篇
  2023年   1篇
  2022年   2篇
  2021年   1篇
  2020年   2篇
  2019年   5篇
  2018年   4篇
  2017年   2篇
  2016年   5篇
  2015年   2篇
  2014年   5篇
  2013年   13篇
  2012年   7篇
  2011年   10篇
  2010年   8篇
  2009年   4篇
  2008年   4篇
  2007年   7篇
  2006年   5篇
  2005年   3篇
  2004年   7篇
  2003年   5篇
  2002年   1篇
  2000年   2篇
  1999年   1篇
  1998年   9篇
  1997年   2篇
  1996年   2篇
  1995年   2篇
  1993年   2篇
  1992年   1篇
  1986年   1篇
  1985年   1篇
  1983年   1篇
  1981年   1篇
  1976年   1篇
  1974年   1篇
  1959年   1篇
  1948年   1篇
排序方式: 共有132条查询结果,搜索用时 15 毫秒
1.
Any sniffer can see the information sent through unprotected ‘probe request messages’ and ‘probe response messages’ in wireless local area networks (WLAN). A station (STA) can send probe requests to trigger probe responses by simply spoofing a genuine media access control (MAC) address to deceive access point (AP) controlled access list. Adversaries exploit these weaknesses to flood APs with probe requests, which can generate a denial of service (DoS) to genuine STAs. The research examines traffic of a WLAN using supervised feed-forward neural network classifier to identify genuine frames from rogue frames. The novel feature of this approach is to capture the genuine user and attacker training data separately and label them prior to training without network administrator’s intervention. The model’s performance is validated using self-consistency and fivefold cross-validation tests. The simulation is comprehensive and takes into account the real-world environment. The results show that this approach detects probe request attacks extremely well. This solution also detects an attack during an early stage of the communication, so that it can prevent any other attacks when an adversary contemplates to start breaking into the network.  相似文献   
2.
Approximately 1.5 μm thick CrN and CrAlN coatings were deposited on silicon and mild steel substrates by reactive direct current (DC) magnetron sputtering. The structural and mechanical properties of the coatings were characterized using X-ray diffraction (XRD) and nanoindentation techniques, respectively. The bonding structure of the coatings was characterized by X-ray photoelectron spectroscopy (XPS). The surface morphology of the coatings was studied using scanning electron microscopy (SEM) and atomic force microscopy (AFM). The XRD data showed that the CrN and CrAlN coatings exhibited B1 NaCl structure. Nanoindentation measurements showed that as-deposited CrN and CrAlN coatings exhibited a hardness of 18 and 33 GPa, respectively. Results of the surface analysis of the as-deposited coatings using SEM and AFM showed a more compact and dense microstructure for CrAlN coatings. The thermal stability of the coatings was studied by heating the coatings in air from 400 to 900 °C. The structural changes as a result of heating were studied using micro-Raman spectroscopy. The Raman data revealed that CrN coatings got oxidized at 600 °C, whereas in the case of CrAlN coatings, no detectable oxides were formed even at 800 °C. After annealing up to 700 °C, the CrN coatings displayed a hardness of only about 7.5 GPa as compared to CrAlN coatings, which exhibited hardness as high as 22.5 GPa. The potentiodynamic polarization measurements in 3.5% NaCl solution indicated that the CrAlN coatings exhibited superior corrosion resistance as compared to CrN coatings.  相似文献   
3.
Three new algorithms for the development of stream cipher based on elliptic curve point multiplication are presented in this paper. Extensive analysis of the properties of keystreams produced by various algorithms available in literature for the generation of Pseudorandom Bit Sequence (PRBS) based on the elliptic curve is carried out. New algorithms are proposed as modifications over these schemes in such a way that the weakness of these schemes in terms of reduced cryptographic strength and periodicity are overcome. Since elliptic curve cryptography is replacing RSA in most of the cryptosystems as the standard for key exchange, an EC based stream cipher provides a good option for encryption using the available infrastructure for elliptic curve point multiplication.  相似文献   
4.
A positive and innovative organizational climate is of great importance in order to manage and adapt to change. Such a climate seldom evolves in organizations closely governed by rules and regulations. Because of ongoing organizational and technical changes within the Swedish Air Navigation Services Provider, a study concerning the organizational climate for changes and innovations was conducted to investigate the organization's capacity to cope with changes. Study locations were the two Swedish main air traffic control centers and parts of the civil aviation administration headquarters. In the study 390 subjects took part and the CCQ questionnaire was used to measure the organizational climate. The results show that the organizational climate is quite positive despite the rule-governed work. The results also show that administrative personnel assess the organizational climate as more positive than operative personnel. Comparisons between management positions did not result in any differences.  相似文献   
5.
"Hyperlipidemic crisis" is a term used to describe episodic abdominal pain in patients with hyperlipidemia. The morphologic correlates of this phenomenon have not been investigated and the etiology of the disorder is uncertain. We report a unique histologic finding in the pancreas of a 34-year-old woman with a 17-year history of episodic abdominal pain, sometimes accompanied by hyperamylasemia. At the age of 18 years, grossly elevated cholesterol and triglyceride levels were documented and type V hyperlipidemia was diagnosed. At the age of 34 years, subtotal pancreatectomy was performed for intractable abdominal pain. Histologic examination identified an increased number of enlarged pancreatic nerves that were infiltrated by foamy macrophages and encircled by fibrous tissue; endoneurial infiltration with macrophages occasionally split nerves into individual fascicles. Otherwise, the pancreas had only minimal fibrosis, nesidioblastosis, mucinous metaplasia of some pancreatic ducts, and scattered small collections of chronic inflammatory cells, subtle features suggesting very mild chronic pancreatitis. We propose that this novel xanthomatous neuropathy mimicked pancreatitis and was one of the underlying pathophysiologic mechanisms of abdominal pain in this patient. Further studies are necessary to document the prevalence of this new entity in patients with hyperlipidemia and to correlate its occurrence with "hyperlipidemic crisis" in those individuals.  相似文献   
6.
Antler bone displays considerable toughness through the use of a complex nanofibrous structure of mineralized collagen fibrils (MCFs) bound together by non-collagenous proteins (NCPs). While the NCP regions represent a small volume fraction relative to the MCFs, significant surface area is evolved upon failure of the nanointerfaces formed at NCP–collagen fibril boundaries. The mechanical properties of nanointerfaces between the MCFs are investigated directly in this work using an in situ atomic force microscopy technique to pull out individual fibrils from the NCP. Results show that the NCP–fibril interfaces in antler bone are weak, which highlights the propensity for interface failure at the nanoscale in antler bone and extensive fibril pullout observed at antler fracture surfaces. The adhesion between fibrils and NCP is additionally suggested as being rate dependent, with increasing interfacial strength and fracture energy observed when pullout velocity decreases.  相似文献   
7.
8.
Comprehensive, automated software testing requires an oracle to check whether the output produced by a test case matches the expected behaviour of the programme. But the challenges in creating suitable oracles limit the ability to perform automated testing in some programmes, and especially in scientific software. Metamorphic testing is a method for automating the testing process for programmes without test oracles. This technique operates by checking whether the programme behaves according to properties called metamorphic relations. A metamorphic relation describes the change in output when the input is changed in a prescribed way. Unfortunately, finding the metamorphic relations satisfied by a programme or function remains a labour‐intensive task, which is generally performed by a domain expert or a programmer. In this work, we propose a machine learning approach for predicting metamorphic relations that uses a graph‐based representation of a programme to represent control flow and data dependency information. In earlier work, we found that simple features derived from such graphs provide good performance. An analysis of the features used in this earlier work led us to explore the effectiveness of several representations of those graphs using the machine learning framework of graph kernels, which provide various ways of measuring similarity between graphs. Our results show that a graph kernel that evaluates the contribution of all paths in the graph has the best accuracy and that control flow information is more useful than data dependency information. The data used in this study are available for download at http://www.cs.colostate.edu/saxs/MRpred/functions.tar.gz to help researchers in further development of metamorphic relation prediction methods. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
9.
Immunoglobulin E (IgE)-mediated food allergy to crustaceans and mollusks is relatively common and affected individuals typically react to a range of different species. The only known major allergen of shrimp was first described over 20 years ago and later identified as the muscle protein tropomyosin. This protein may be useful as a defined and relevant diagnostic marker for allergic sensitization to invertebrate foods. In order to generate an assay reagent suitable for this purpose, tropomyosin from the shrimp Penaeus aztecus (Pen a 1) was produced as a recombinant protein in Escherichia coli and characterized with respect to IgE antibody binding properties in comparison to natural shrimp tropomyosin. Hexahistidine-tagged rPen a 1 accumulated as a predominantly soluble protein in the E. coli expression host and a two-step chromatographic procedure provided a high yield of pure and homogeneous protein. rPen a 1 displayed chromatographic and folding characteristics similar to those of purified natural shrimp tropomyosin. Serum preincubation with serial protein dilutions revealed similar capacity of recombinant and natural tropomyosin to compete with immobilized shrimp extract for IgE binding. rPen a 1 was further shown to extensively and specifically compete for IgE binding to extracts of other crustacean species, house dust mite and German cockroach.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号